Will Australia's Encryption Law Kill Privacy in Name of Safety?

images (1).jpg

Government leaders & law enforcement are trying to force tech companies to put backdoors in encryption in the name of public safety. There are 750,000 law enforcement employees & 1/2 million US intelligence agencies community employees who may use those backdoors, & likely many others worldwide. Strong encryption is available throughout the world. If businesses & general public are forced to use encryption with back doors, will cybercrooks will be the only ones using strong encryption; those the backdoors were intended to be used on to begin with? How will Australia’s new law requiring encryption backdoors impact data security & privacy? Who has oversight of that law? How will it impact other countries? Does any evidence prove encryption backdoors have improved safety/security? Rebecca discusses these and related issues with Dr. Katina Michael, Arizona State University director of the Centre for Engineering, Policy and Society. Katina is also a privacy and uberveillance pioneer.

Source: Katina Michael with Rebecca Herold, 5 February 2019, “Will Australia’s Encryption Law Kill Privacy in the Name of Safety?”, Data Security and Privacy: Voice of America, https://www.voiceamerica.com/show/episode/112884

Industry calls for more caution over MHR system

hand.jpg

As the Federal Government today pushes the button to create My Health Records for every Australian who wants one, the industry has stepped out asking for more transparency around security and secondary use of the records to enable people to make more informed decisions about it. 

The industry has also voiced out about data de- and re-identification, a global approach to cybersecurity issues as healthcare digitises, information security requirements of the future and blockchain as a way to alleviate some of the challenges associated with the My Health Record system.  

On 26 November 2018, the Federal Parliament passed legislation to strengthen privacy protections in My Health Records Act 2012 without debate or division.

The new legislation means that Australians can opt in or opt out of My Health Record at any time in their lives. Records will be created for every Australian who wants one after 31 January and after then, they have a choice to delete their record permanently at any time.

The date of 31 January follows much deliberation from the Federal Government to extend the opt-out date. Australians initially had until 15 October 2018 to opt out of the national health database, or a My Health Record was to be created for them by the end of that year. 

But following the opposition calling for an extension to the opt-out period, the public outcry against the potential for the data to be shared with police and other government agencies, a leaked government document detailing the Australian Digital Health Agency’s response to concerns and a raft of changes recommended by the Senate Inquiry into My Health Record, the Federal Government pushed this date back and relaxed its stance on when Australians can opt in or opt out of the system.  

Australian Academy of Technology and Engineering (ATSE) President Professor Hugh Bradlow said the collection of health data across the population will result in better health outcomes as it not only shows how effective interventions are, but also allows treatments to be personalised based on the experience of thousands of other patients.

“New forms of measurement (based on artificial intelligence) will also give patients far more significant information about institutional performance, practitioner performance, the outcomes of specific interventions, etc.” he said. 

The Society of Hospital Pharmacists of Australia (SHPA) Chief Executive Kristin Michaels said the My Health Record debate highlighted the need for an integrated ehealth system, accessible only to health professionals and set up at the request of health organisations, for the benefit of all Australians.

"All Australians, regardless of any illness or condition, deserve to get the highest-quality care,” Michaels said. 

“More often than many would think, patients are unable to explain the medicines they are already taking and for what conditions they are already being treated, particularly after a seizure or if unconscious. Many of these patients are unaccompanied. Sometimes this lack of information leads to errors that have serious impacts on people’s lives. 

“[Hence] hospital pharmacists have long called for a shared, electronic patient data system that links up a fragmented health system and empowers patients in their own care."

The issue of security 

However, University of Melbourne Department of Computing and Information Systems Cybersecurity Senior Lecturer Associate Professor Vanessa Teague expressed her concerns around the privacy implications of secondary uses of My Health Records not being accurately explained.

"The My Health Record privacy policy says: ‘It is expected that most applications which are assessed will be for the use of de-identified data. This is where your personal details are removed from the dataset and you cannot be identified.’ Unfortunately, removing obvious personal details (such as name, location, and date of birth) does not securely de-identify the data,” Teague said.  

“Both doctors and patients can be easily and confidently identified in a dataset… In the case of patients, this means that a few points of information, such as the patient's age and dates of surgeries or childbirths, is enough to identify the person and thus, retrieve all their Medicare bills and PBS [Pharmaceutical Benefits Scheme] prescriptions for many years.  

“Easy and confident re-identification has been demonstrated on numerous other datasets that were shared in the mistaken belief that they were de-identified. It is probably not possible to securely de-identify detailed individual records like My Health Records without altering the data so much that its scientific value is substantially reduced.” 

[Read more: My Health Record system data breaches rise | Game changer: Creator of FHIR writes about approaching critical mass and a growing data sharing revolution]

Teague said patients may choose to opt out of secondary uses of their data but are unable to make a “genuinely informed decision” if they are inaccurately told that their detailed record cannot be identified. 

“Even more importantly, those whose identifiable MBS [Medicare Benefits Schedule]-PBS records were already published in 2016 should be notified, because the earlier release could make re-identification of their My Health Records much easier,” she said. 

Harvard Medical School International Healthcare Innovation Professor Dr John Halamka also previously criticised the system for relying on outdated technology, saying that the $2 billion My Health Record was nothing more than “digitised paper” as it uses such “out-of-date” technology that crucial patient information on test results and diseases are unable to be read or shared by computers.

University of Wollongong School of Computing and Information Technology Professor Katina Michael said health data breaches, for some, could have a huge impact. 

She used the recent example from Singapore, where 1.5 million Singapore health records were breached in a highly targeted effort on SingHealth. Among the breached health records was Singapore Prime Minister Lee Hsien Loong's personal records.

“What does this tell us when one of the world's most advanced cybersecurity nations suffers such a large-scale attack? Plainly, that no one's personal information is safe, no matter the measures in place,” she said. 

"If we have learnt anything over the last four months, it is that electronic health records are hackable. We need not have to look too far to see that no system is impenetrable.” 

Michael also speculated that there is the possibility of a ramp up of blockchain initiatives to beef up on My Health Record security.  

“We will likely be told in the not too distant future that we wildly underestimated our security requirements and as such, must go one step further and protect our credentials,” she said. 

According to Professor Michael, this involves the implant of a 16-digit Personal Health Record (PHR) ID number into people that also reads vital signs while embedded. This technology then alerts first responders of ailments and medications without the need for the person to provide any information. 

[Read more: Australia leads the world in personal control of electronic health records | Is the My Health Record technology out of date?]

ATSE’s Bradlow said the industry needs to be “realistic” about it as the danger of data leaking due to cyber hacking is as true as hacking any other data system. 

“Let’s remember that many [healthcare professionals] have easy access to today’s paper-based health records – an electronic record is actually a step up in privacy. Within My Health Record, we can make it the default to require a patient access code,” he said. 

“A well-designed record system which is managed by a professional security organisation and has a clear audit trail, for example, provided by blockchain, can mitigate this risk significantly."

Source: Hafizah Osman, 31 January 2019, “Industry calls for more caution over MHR system”, https://www.healthcareit.com.au/article/industry-calls-more-caution-over-mhr-system

Note: Thank you Hafizah Osman— interestingly I was referring to the VeriChip experiment of the PHR that Dr John Halamka trialled for a short time and wrote about in 2006 here: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC1656959/

Data Expert Warns Encryption Laws could have Catastrophic Outcomes

encryption.jpg

A University of Wollongong data expert has labeled the government's proposed encryption laws delusional and warns they could have catastrophic consequences.

The changes would force technology companies to help police access encrypted messages.

Professor Katina Michael, from the School of Computing and Information Technology says the powers are unprecedented and have no oversight.

She is speaking to ABC reporter Kelly Fuller.

Citation: Katina Michael with Kelly Fuller, “Rushed Encryption Laws Herald a Watering Down in National Security”, ABC Illawarra: Radio, 6 December 2018, https://soundcloud.com/kelfuller/data-expert-warns-encryption-laws-could-have-catastrophic-outcomes

Tech for Good: The Role of ICT in Achieving the SDGs

What opportunities and challenges do digital technologies present for the development of our society?

https://vimeo.com/288621991

https://vimeo.com/288621991

I truly believe that we can harness technology for good. That information and communication technology is key to achieving the Sustainable Development Goals. But more than this? We need to be human. Being human means that we can achieve anything together through compassion, care, foresight, and long-term sustainability. Right now we use technology in ways that helps us to gain access to critical information, but also as a means to become more engrossed in ourselves and our personal interests alone. What about the public interest? What about public interest technologies like those being suggested by the SDG Academy an all of its speakers? Think on doing this rewarding course. It takes a mission critical view of how technology can be used (or abused) as a tool for dis(empowerment). We have a choice- from our perspective the choice is easy- we MUST use technology for good.

The trailer for the magnificent SDG Academy. Here are courses delivered by the SDG Academy. More about the free online courses here.

My involvement was in 3 MOOCS related to: privacy, data rights, security and ethics, with a heavy emphasis on human rights throughout. Stay tuned for more.

About this course

Tech for Good was developed by UNESCO and Cetic.br/NIC.br, the Brazilian Network Information Center’s Regional Center for Studies on the Development of the Information Society. It brings together thought leaders and changemakers in the fields of information and communication technologies (ICT) and sustainable development to show how digital technologies are empowering billions of people around the world by providing access to education, healthcare, banking, and government services; and how “big data” is being used to inform smarter, evidence-based policies to improve people’s lives in fundamental ways.

It also addresses the new challenges that technology can introduce, such as privacy, data management, risks to cybersecurity, e-waste, and the widening of social divides. Ultimately, Tech for Good looks at the ways in which stakeholders are coming together to answer big questions about what our future will look like in a hyper-digitized world.

This course is for:

Technology specialists who want to understand more about how ICT is being used to improve people’s lives around the world.
Sustainable development practitioners who need to understand the opportunities and limitations of technology in a development context.
Advanced undergraduates and graduate students interested in the key concepts and practices of this exciting and ever-changing field.

What you'll learn

  • ICT can improve access to knowledge and services, promote transparency, and encourage collaboration

  • Responsible collection and use of data requires governance, security, and trust

  • ICT projects should be contextualized and inclusive

  • Technology is not neutral! Be aware of bias in design and implementation

 Hide Course Syllabus

Course Syllabus

Module 1: Welcome to the Digital Age

  • Introduction to the Course

  • Bridging the Digital Divide

  • Three Approaches to ICT for the SDGs

Module 2: Technology for Governments and Citizens

  • Equity and Access to Services

  • User-Driven Public Administration

  • It's All About the Data

  • The Open Government Approach

  • Case Study: Aadhaar in India

  • The Challenges of Digital Government

Module 3: ICT Infrastructure

  • Enabling ICT: The Role of Infrastructure

  • Promoting Digital Inclusivity

  • Innovations in Infrastructure

  • Building Smart Sustainable Cities

  • ICT as Infrastructure: A Look at Societal Platforms

Module 4: ICT Innovations in Health

  • Achieving Universal Health Coverage

  • Improving Healthcare Delivery

  • Involving the Community

  • Evidence in Action: Success Stories of ICT and Health

  • Emerging Challenges and Opportunities

Module 5: Learning in Knowledge Societies

  • The Ecosystem of ICT for Education

  • Education for a Connected World

  • Sharing Knowledge: ICT, Openness, and Inclusion

  • Measuring ICT and Education: Frameworks

  • Measuring ICT and Education: Data and Indicators

  • Rethinking ICT for Education Policies

Module 6: Promoting Financial Inclusion

  • An Introduction to Financial Services

  • The Potential of Digital Platforms

  • Mobile Payments for Marginalized Communities

  • ICT for Enabling Access to Credit

  • Replacing the Cash Economy

  • The Challenges of ICT-enabled Financial Inclusion

Module 7: Measurement and Metrics

  • Managing Data for the SDGs

  • ICT Innovation for Statistical Development

  • Engaging with Data: Communications and Citizen Empowerment

  • Case Study: Brazil’s Cetic.br

  • Measuring ICT

  • ICT for Monitoring the SDGs

  • Limitations of ICT for Monitoring the SDGs

Module 8: Artificial Intelligence

  • An Introduction to Artificial Intelligence

  • Who Drives the Agenda on “AI for Good”?

  • Implications for Discrimination and Exclusion

  • The Human Side of AI: Risks and Ethics

Module 9: Concerns for our Digital Future

  • Privacy and the Importance of Trust

  • Knowing your Data Rights

  • Cybersecurity

  • The Downsides of Digital

Module 10: The Way Forward

  • The New Workforce: Six Points about the Future of Work

  • The Meaning of Work in the Digital Era

  • The Open Movement

  • Closing Thoughts on ICT for the SDGs

Original link here: https://www.edx.org/course/tech-for-good-the-role-of-ict-in-achieving-the-sdgs

Psychometrics, big data, data-driven approaches, microtargetting, and you

The damning evidence is mounting on CA. Today it was announced that CEO Alexander Nix has been suspended from his position given a Channel 4, UK covert sting recording.

Citation: Katina Michael with Cassie McCullagh, March 21, 2018, "Psychometrics, big data, data-driven approaches, microtargetting, and you", ABC Sydney Radio: FOCUS: http://www.abc.net.au/radio/sydney/programs/focus/focus/9549448

Biometric data from driver's licences added to government database

your face used to track you by government.jpg

Your face is becoming the latest weapon in the world of digital surveillance, and the humble driver's licence looms as a game-changer in tracking individuals through both the real and virtual world.

Experts warn your biometric data may already be vulnerable to misuse by criminals and terrorists, as the proliferation of mobile cameras combined with social media and ubiquitous CCTV feeds mean we're caught on screen more than ever before.

Key points

  • Biometric data builds an online profile using your photo, age and address
  • This can then be matched against photos gathered from the internet or CCTV
  • The data can be used by government agencies, along with companies and criminals

Driver's licences will be added to the Commonwealth Government's already vast biometric databases after it struck an agreement with the states and territories, handing authorities access to an unprecedented level of information about citizens.

A system known as "the interoperability Hub" is already in place in Australia, allowing agencies to take an image from CCTV and other media and run it against a national database of passport pictures of Australian citizens — a process known as "The Capability".

But soon driver's licences will be added to the system, allowing both government and private entities to access your photo, age and address.

It is a $21 million system being sold as a way to tackle terrorism and make commercial services more secure.

But experts warn people now risk losing control of their biometric identity entirely as commercial interests, governments and organised crime gangs all move to capture more personal metadata for their own gain.

Driver's licences change the biometric game

Technology and legal expert Professor Katina Michael said about 50 per cent of the population already had some kind of visual biometric stored in a nationally-accessible database, but the inclusion of drivers licenses would see the proportion of Australians scooped up in the net swell to about 80 per cent.

She said one of the biggest risks of the collection of biometric data was not deliberate misuse by the AFP, ASIO or another government agency, but rather vulnerabilities in the way biometrics work.

Who can access your biometric data?

Document Verification Service (DVS) - government and private sector

  • Companies and government can run an identity document through a database to see if it matches information held on file, and that the document has not been revoked
  • Individual must consent before DVS used

Face Verification Service (FVS) - government and private sector

  • Enables a facial image of an individual to be compared against government records of that same individual, such as passports and drivers licences
  • Individual must consent or a legislative basis must be established to collect the information, and use must comply with the Privacy Act

Face Identification Service (FIS) - only law enforcement agencies can use

  • A facial image can be compared against multiple facial images held on a government database, including Australian citizens' passport photos and now driver's licences.
  • Multiple records of people who have a close match to the image are usually returned
  • An agency must have a legislative basis or authority to collect and use the information
  • Access is restricted to law enforcement agencies or those with national security related functions

"It's not like a one-on-one match, where you put (in) an individual's face and say: 'they're a suspect'," Professor Michael said.

"But rather what you get returned is a number of possibilities … you might get back 15, or 20, or 30, or 50 matches.

So you might have 50 innocent people being suspects, rather than the person that you're trying to catch

Professor Michael said this meant that while over time a person's name might be cleared, their data could remain in a database linked to a criminal investigation.

"And then I'm thinking, what happens to their level of innocence as time goes on, because they accidentally look like a minority group?" she said.

She said real criminals and terrorists would opt out of the system, choosing not to have passports and driver's licenses in a bid to escape the net.

"Of course, if you've done nothing wrong, the old adage says you're fine. But increasingly, we don't know if we're fine," she said.

The rise of 'uberveillance'

Professor Michael said modern surveillance methods employed by law enforcement were not just limited to CCTV — they now incorporated vast amounts of metadata and social media, leading to a concept known as "uberveillance" in which people were constantly monitored.

"What we have now are digital footprints that we all leave behind," she said.

"Phone call records, internet searches, credit cards and even the data on your electronic train or bus ticket can be used to track your movements and activity.

"It brings together all these various touchpoints, telecommunications records, travel data via tokens, facial recognition on federal databases, your tax file number … that's accessible depending on the level of crime and social media.

"You've got this very rich almost cradle-to-grave kind of data set that's following you."

We asked if you were concerned about driver's licenses being added to a biometric database.

 

Organised criminals want your identity

Stephen Wilson runs Lockstep Consulting, a Sydney-based firm which researches and tracks trends in biometrics in the corporate and government spheres, and advises clients on best-practice.

He said at the moment very secure biometric systems took quite a long time to process images accurately.

Problems arose when consumer convenience, such as being able to unlock a phone or access a bank account with a quick face or fingerprint scan, trumped security.

"No police force, no public service, no business is ever perfect, there is always going to be corrupt people," Mr Wilson said.

"The more exposure we have to electronic databases, the more exposure we have to biometric matching, it's only a matter of time before these bad actors succumb to temptation or they succumb to corruption and they wind up using these systems inappropriately."

Your biometric twin is out there

VIDEO: Professor says nothing to fear from federal driver's license database (ABC News)

Mr Wilson said biometrics were creeping into consumer services like bank accounts and online betting facilities, with customers asked to send a picture of their licence and a "selfie" that will be run through an identity matching service.

"The real risk is that bad actors will take people's photos, ask for a match, and get back a series of matches of people that are kind of like your biometric twin," he said.

"We've all got doppelgangers, we've all got people in public that look just like us.

"If you're trying to perpetrate a crime, if you're organised crime, and you're trying for example to produce a fake driver's licence, it's absolute gold for you to be able to come up with a list of photos that look like 'Steve Wilson'."

Technology companies like Apple and Samsung have championed the use of biometrics such as fingerprints, and this has taken a step further with facial recognition becoming more common thanks to the release of the iPhone X.

PHOTO: Apple's iPhone X has championed facial recognition technology. (Twitter: AppleEventos)

However Mr Wilson said a key difference was that information stayed on the phone, while banking and other commercial interests trying to use your biometrics to confirm your identity could be storing it on a server anywhere.

"Do you really want your photo, which is a pretty precious resource, sent off to a company perhaps on the other side of the world just so you can get a quick bank account or quick betting service set up?" he asked.

What will happen next?

An annual industry survey conducted by the Biometrics Institute, known as the Industry Trend Tracker, has nominated facial recognition as the biometric trend most likely to increase over the next few years.

Respondents believed privacy and data protection concerns were the biggest constraint on the market, followed by poor knowledge of decision makers, misinformation about biometrics and opposition from privacy advocates.

The Australian law reform commission says biometric systems increasingly are being used or contemplated by organisations, including in methadone programs, taxi booking services, ATMs and online banking, and access to buildings

Dr Michael said governments needed to be very cautious about how they applied this rich new source of data in the future.

She said governments were building these agreements between themselves and corporations in a bid to stamp out fraud, but that goal was not always achieved and the potential for mistakes was vast.

"What we have is this matching against datasets, trying to find the needle in the haystack," she said.

"Often what happens is we don't find the needle."

A statement from the Department of Home Affairs said the Australian Government was exploring making the Face Verification Service available to the private sector, but nothing had started at this point.

It said arrangements for private sector access would be informed by an independent privacy impact assessment and those using it would need to demonstrate their lawful basis to do so under the privacy act and where they had gained consent to use a person's image.

 

Source: Rebecca Trigger, January 15, 2018, "Experts sound alarm as biometric data from driver's licences added to government database", ABC News, http://www.abc.net.au/news/2018-01-15/alarm-raised-as-drivers-licences-added-to-government-database/9015484

Reprinted in The New Daily here: https://thenewdaily.com.au/news/national/2018/01/15/biometric-data-drivers-licences-government-database/

Furthermore, an interview with Professor Brian Lovell from the University of Queensland on the ABC further demystifies facial biometrics and the government's use of The Capability: http://www.abc.net.au/news/2018-01-15/professor-says-nothing-to-fear-from-federal/9330626

 

Kekhawatiran Semakin Terbukanya Data Pribadi di Era Digital

Kekhawatiran Semakin Terbukanya Data Pribadi di Era Digital

Senin, 15 Januari 2018 11:05 WIB

Wajah kita menjadi alat terbaru dalam dunia pengawasan digital. Dan di Australia kartu izin mengemudi mulai digunakan untuk melacak orang-orang, baik di dunia nyata maupun dalam dunia maya.

Data Biometrik

  • Sistem biometrik adalah mengenali seseorang berdasarkan ciri-ciri fisik, karakter, dan perilakunya
  • Data biometrik menggunakan data pribadi online lewat foto, usia, dan alamat tinggal
  • Data pribadi ini kemudian dicocokan dengan gambar yang terekam CCTV atau foto di internet
  • Data bisa digunakan oleh agen pemerintah, termasuk perusahaan, bahkan kelompok kejahatan

Para ahli memperingatkan data biometrik milik kita mungkin sudah rentan disalahgunakan oleh komplotan penjahat dan teroris, karena maraknya gabungan penggunaan telepon dan jejaring sosial serta adanya kamera CCTV dimana-mana, sehingga kita lebih sering tertangkap kamera.

Kartu izin mengemudi akan ditambahkan ke database biometrik di Australia, setelah adanya kesepakatan dengan negara-negara bagian dan wilayah khusus, sehingga pihak berwenang dapat mengakses informasi soal warga mereka dengan cara yang belum pernah ada sebelumnya.

Sebuah sistem yang dikenal dengan sebutan 'The Interoperability Hub' sudah ada di Australia, yang memungkinkan pihak-pihak berwenang untuk mengambil foto dari CCTV atau media lainnya yang kemudian dicocokkan dengan database foto-foto dari paspor. Proses ini dikenal dengan sebutan 'The Capability.'

Tetapi, setelah kartu izin mengemudi masuk ke sistem database baru, maka pemerintah dan sejumlah pihak swasta dapat mengakses foto, usia, dan alamat Anda.

Sistem ini sudah menghabiskan $21 juta, senilai Rp 210 miliar, sebagai cara untuk mengatasi terorisme dan membuat layanan komersial lebih aman.

Namun para ahli memperingatkan kini warga beresiko kehilangan biometrik mereka sama sekali, karena pihak komersial, pemerintah dan kelompok kejahatan terorganisir berupaya untuk mendapatkan lebih banyak data pribadi demi keuntungan mereka sendiri.

Kartu izin mengemudi jadi sumber data baru

Kartu izin mengemudi di Australia sudah ditambahkan sebagai sumber data biometrik

Pakar teknologi dan hukum, Profesor Katina Michael mengatakan sekitar 50 persen populasi Australia telah memiliki semacam biometrik visual tersimpan dalam database yang dapat diakses secara nasional. Namun dengan digunakannya kartu izin pengemudi akan menyebabkan lebih banyak data pribadi warga yang tersimpan dan membuat jumlahnya naik 80 persen.

Profesor Michael mengatakan salah satu risiko terbesar dari pengumpulan data biometrik adalah bukan penyalahgunaan yang tidak disengaja oleh kepolisian federal Australia (AFP), agen intelijen Australia (ASIO), atau agen pemerintah lainnya, melainkan kerentanan cara kerja biometrik yang rentan.

"Ini bukan seperti Anda memasukan wajah seseorang kemudian mengatakan, 'mereka adalah tersangka'," kata Profesor Michael.

"Tapi yang kita dapatkan adalah sejumlah kemungkinan... mungkin ada 15, 20, 30, atau bahkan 50 kemiripan."

Jadi, yang akan didapatkan bukan satu orang yang akan ditangkap, melainkan 50 orang yang tak bersalah menjadi tersangka.

Profesor Michael menjelaskan ini berarti bahwa meski nama seseorang bisa dipulihkan seiring waktu jika terbukti tidak bersalah, tapi masih ada dalam database yang terkait penyelidikan kriminal.

Orang diawasi secara terus menerus

Teknologi baru bisa memantau dan mengenali wajah orang di kerumunan.

Profesor Michael mengatakan metode pengawasan modern yang digunakan penegak hukum tidak hanya terbatas pada CCTV. Mereka juga sekarang bisa memasukkan sejumlah besar metadata dan jejaring sosial, yang mengarah ke konsep dengan sebutan "uberveillance" di mana orang-orang dipantau secara terus menerus.

"Sekarang kita memiliki 'jejak digital' yang ditinggalkan semua orang," katanya.

"Catatan panggilan telepon, apa yang dicari di internet, kartu kredit, bahkan data pada kartu elektronik kereta atau bus dapat digunakan untuk melacak pergerakan dan aktivitas Anda."

Apa selanjutnya?

Survei industri tahunan yang dilakukan oleh Biometrics Institute, yang dikenal sebagai 'Industry Trend Tracker', telah menyatakan teknologi pengenalan wajah kemungkinan akan menjadi tren biometrik yang meningkat dalam beberapa tahun ke depan.

Para responden survei merasa masalah privasi dan perlindungan data sebagai kendala terbesar, diikuti dengan pengetahuan yang buruk para pengambil keputusan, kesalahan informasi soal biometrik, serta penolakan dari pendukung privasi.

Komisi reformasi hukum Australia mengatakan sistem biometrik semakin banyak digunakan atau dipertimbangkan oleh banyak organisasi, termasuk program rehabilitisi narkoba, layanan pemesanan taksi, ATM dan perbankan online, serta akses masuk ke gedung.

Profesor Michael mengatakan pemerintah harus sangat berhati-hati dalam menerapkan sumber data baru yang melimpah ini di masa depan.

Menurutnya pemerintah sedang membangun kesepakatan antara pihaknya dengan sejumlah perusahaan untuk berupaya menghindari kecurangan, namun seringkali tidak tercapai dan potensi menyalahgunakan sangatlah luas.

"Apa yang kita lakukan dalam mencocokan dengan kumpulan data adalah seperti menemukan jarum di tumpukan jerami," katanya.

Dalam pernyataan Departemen Dalam Negeri disebutkan Pemerintah Australia sedang menjajaki pembuatan layanan verifikasi lewat pengenalan wajah untuk sektor swasta, namun upaya ini belum dimulai.

Disadur dari laporan aslinya dalam bahasa Inggris yang bisa dibaca disini.

Lihat Artikelnya di Australia Plus

K5's Experiential Robotics Goes Wrong

The war between robots and humans is heating up

robot-drowning.png
Dr Katina Michael is a professor in the School of Computing and Information Technology at the University of Wollongong. She considers the K5 to be a sinister development and has been following its progress since 2013. She’s notes how they look somewhat like the dreaded Daleks from Doctor Who – without the weaponised arm.

What are you meant to do? Take out your umbrella and start hitting it?
“If you see one coming toward you,’’ says Professor Michael, “what are you meant to do? Take out your umbrella and start hitting it?’’

At trade shows, she’s seen a K5 trip on a buckle in the carpeting and fall over. “The question is when they take a different form in the future…. When they can walk like a human. Then it becomes a different proposition. It doesn’t look so harmless. They’re more mobile. They can be tripped … but get up again.’’

She notes that K5 robots were first trialled by Microsoft and Uber. The Uber connection is significant because the ride-share outfit has disrupted the regulated taxi industry by baldly flouting the law. Surveillance robots are being launched upon us in much the same lawless way.

“It’s autonomous, gathers information and is capable of behavioural analysis. It’s a grave invasion of privacy. They are danger to society because they will develop awareness over time. For the first time we have an autonomous system that can follow humans.’’

Biometric Behavioural Analytics

– Professor Katina Michael – Professor at the School of Computing and Information Technology at University of Wollongong chats to Trevor Long and Nick Bennett on Talking Technology about facial recognition technology and whether it could distinguish between twins.

Tech-Focus-1-file069593.jpg

Citation: Katina Michael speaks with Trevor Long and Nick Bennett, "Can twins fool facial recognition technology?", Talking Technology on Talking Lifestyle at 8.40pm-9.00pm, September 7, 2017.

Original source: https://omny.fm/shows/talking-technology/can-twins-fool-facial-recognition-technology

When Google Maps Gets it Wrong

Citation: Katina Michael, Wendy Harmer, "When Google Maps Gets it Wrong", ABC Sydney Mornings, ABC Sydney 702, 9.10am -9.23am, April 21, 2017.

Background:

http://www.makeuseof.com/tag/technology-explained-google-maps-work/

https://en.wikipedia.org/wiki/Google_Maps

http://www.abc.net.au/news/2017-04-19/darwin-man-sick-of-pizza-enquiries-due-to-google-error/8454580

https://support.google.com/maps/answer/3094088?co=GENIE.Platform%3DDesktop&hl=en

https://support.google.com/maps/answer/6194894?co=GENIE.Platform%3DDesktop&hl=en

https://support.google.com/maps/answer/7084895?co=GENIE.Platform%3DDesktop&hl=en

https://www.buchananpr.com/2013/11/4-steps-to-take-when-google-maps-gets-it-wrong